Global Compliance with Integrity

By

Ben Taylor
A U.S. law firm has recognized that consumers who file lawsuits for data breaches resulting from security negligence must give 30-days notice of their intentions. This rule applies to data breaches that occur due to the failure to implement “reasonable security procedures”. If the violation is rectified within the 30 days, written correspondence must be...
Read More
In September 2018, just three months after the California Consumer Privacy Act was introduced, California’s Governor Jerry Brown signed SB 1121 into law. SB 1121 amends the CCPA which was passed in June this year. SB 1121 leaves the Act mostly intact, but it brings clarity to certain aspects of the CCPA. The CCPA is...
Read More
How will the CCPA influence data privacy across the USA? On June 28, 2018, the California Consumer Privacy Act (CCPA) was ratified only a week after it was introduced. The new law is greatly influenced by the European Union’s General Data Protection Regulation (GDPR), which became law in May 2018. California residents are now able...
Read More
Amendments to the Virginia Telephone Privacy Protection Act change the definition of such terms as responsible person, seller, telephone solicitor and telephone solicitation. In future, the telephone solicitor and the seller will be equally liable for violations of the Act. The term “Telephone solicitation call” is now defined as: Any telephone call made to any...
Read More
Information which is collected, processed, disclosed, or sold under the California Financial Information Privacy Act and the GLBA, is CCPA exempt. However, personal information relating to  residents of California that are outside the scope of these laws will still be subject to the CCPA. This includes applicant and employee information, business contacts, commercial client information,...
Read More
Companies that use cloud services must protect against physical threats such as natural disasters, tampering with servers or virtual machine managers, unauthorized access and data transfers, and weak login credentials. They must also log all attempts to access and alert when suspicious activities are identified. Furthermore, they must have adequate environmental controls such as backup...
Read More
A finance company (defendant) has been persistently making debt collection calls, despite not having an individuals’ consent to do so. The individual (plaintiff) asked for the calls concerning the alleged debt to cease. The company failed to show that its phone system was not an Automated Telephone Dialling System (ATDS). The firm based its claim...
Read More
1 10 11 12